0% found this document useful (0 votes)
67 views14 pages

CH6 Security Privacy and Data Integrity AS QP

A level Computer science notes

Uploaded by

abdulmuizrao10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
67 views14 pages

CH6 Security Privacy and Data Integrity AS QP

A level Computer science notes

Uploaded by

abdulmuizrao10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 14
www.RocketRevise.com 4 Acake factory uses machines to make cakes. (a) Complete the following descriptions of types of system. Write the correct missing term in the spaces. ‘The factory uses a .. system to record data such as the number of cakes being produced each hour. When the data collected from sensors are analysed and used as nnn BIS Onn System. One example of this system, used in the factory, is to maintain a constant temperature in the ovens. It uses a 10 measure the values. 4 (b) Cake mixture is mixed in a large pot. A conveyor belt moves the cake tins beneath the pot. ‘The conveyor belt stops and a set quantity of the cake mixture fills the cake tin. The conveyor belt then moves and another cake tin is positioned beneath the pot. Explain how the control system will ensure the correct amount of mixture is placed in the cake tins. www.RocketRevise.com www.RocketRevise.com (c) The cake factory has servers that store its confidential recipes and control the factory ‘machines. Describe the implications of a hacker gaining access to the cake factory's servers. 1 i) Explain how the company could protect its data against hackers. 1 www.RocketRevise.com www.RocketRevise.com (d) The machines have a counter to record the number of cake tins filled. Each time a cake tin is filled, the counter is increased by 1. The value is stored in an 8-bit register and the current value is shown. ofojo}1tfo}ol1 (i) Show the value of the binary number after another five cake tins have been filled. fy (ii) The following table shows some assembly language instructions for a processor which hhas one general purpose register, the Accumulator (ACC). Instruction Explanation Opcode | Operand AND | #n Bitwise AND operation of the contents of ACC with the ‘operand AND |
| Bitwise AND operation of the contents of ACC with the contents of
xoR | #n Bitwise XOR operation of the contents of ACC with the ‘operand xOR |
| Bitwise XOR operation of the contents of ACC with the contents of
or | #n Bitwise OR operation of the contents of ACC with the ‘operand OR |
| Bitwise OR operation of the contents of ACC with the contents of
LsL| #n Bits in ACC are shifted logically n places to the left. Zeros are introduced on the right hand end LSR | #n Bits in ACC are shifted logically n places to the right. Zeros are introduced on the left hand end At the end of each day, the register is reset to 0. Write the assembly language statement to reset the register to 0. www.RocketRevise.com www.RocketRevise.com (iii) A two-place logical shift to the left is performed on the binary number shown in part (a) Show the result of this logical shift a (iv) State the mathematical result of a one-place logical shift to the right on a binary number, a (e) The factory servers run software that makes use of Artificial Intelligence (Al). Explain how the use of Al can help improve the safety and efficiency of the factory. B31 www.RocketRevise.com www.RocketRevise.com Each of the following algorithms performs data validation, State the type of validation check that each of the algorithms performs. (a) INPUT x IF x <0 OR x > 10 THEN ourpuT "Invalid" ENDIF (1 (b) INPUT x IF x = "" THEN OUTPUT "Invalid" ENDIF a () INPUT x IF NOT(x = "Red" OR x = "Yellow" OR x = “Blue") THEN ourpUT "Invalia’ ENDIF (1 www.RocketRevise.com www.RocketRevise.com company has several security measures in place to prevent unauthorised access to the data on its computers. (a) Describe the difference between the security and privacy of data. (2) (b) Each employee has a username and password to allow them to log onto a computer, An employee's access rights to the data on the computers is set to either read-only, or read and write, Identify one other software-based measure that could be used to restrict the access to the data on the computers. (c)_ The company is also concerned about threats posed by networks and the internet Identify two threats to the data that are posed by networks and the internet. Threat 1. Threat 2 .. 2) www.RocketRevise.com www.RocketRevise.com Xanthe wants to maintain the integrity and security of data stored on her computer. (a) Explain the difference between data security and data integrity. (2) (b) Xanthe uses both data validation and data verification when entering data on her computer. Describe how data validation helps to protect the integrity of the data. Give an example in your answer. Desoription .... Example i Describe how data verification helps to protect the integrity of the data. Give an example in your answer. Description ( Example .... (2) (c)_ Two malware threats are spyware and viruses. Give two similarities and one difference between spyware and a virus. Similarity 1. Similarity 2 . Difference ..... (3) [Turn over. www.RocketRevise.com www.RocketRevise.com ‘When designing computer systems, itis important to consider the security, integrity and privacy of the data Draw one line from each measure to indicate whether it keeps data secure or protects th of data, Measure | Firewall | Double entry Presence check Data Security Data Integrity Password (2 www.RocketRevise.com www.RocketRevise.com 3. Ateacher is writing examination papers on a laptop computer. The computer is connected to the internet. The teacher is concemed about the security and privacy of the papers. (a) State the difference between the security of data and the privacy of data. a (b) Identify and describe two threats to the data. Identify one security measure to protect against each threat. Each security measure must be different. Threat 1 .. Description .. Security measure Threat 2 Description J Security measure ¢ (6) www.RocketRevise.com www.RocketRevise.com Aschool stores personal data about its staff and students on its computer system. (a) Explain why the school needs to keep both its data and its computer system secure from unauthorised access. Data Computer system (2) (b) Complete the table by identifying two security threats to the data on a computer. Describe each threat. Give a different prevention method for each threat. Prevention method Threat Description (6) (c)_ Data is encrypted when it is transmitted within the school network, or externally such as. over the internet. Describe what is meant by encryption and explain why itis used. (2) [Turn over. www.RocketRevise.com www.RocketRevise.com 5 A. company wants to store data about its employees in a computer system. The owner of the company wants to ensure the security and integrity of the data (a) (i) State why data needs to be kept secure. fo} i) One way the data stored in a computer can be kept secure is by using back-up software. Give two other ways the data stored in a computer can be kept secure. 1. 2) (b) The data about the employees is currently stored on paper. The data needs to be transferred into the computer system, Data validation and verification are used to help maintain the integrity of the data. (i) Identity and describe one method of data verification that can be used when transferring the data from paper to the computer. Method .. Description . (21 (ii) The company needs to transfer the date of birth of each employee into the computer system, Give one example of how each of the following data validation rules can be used to validate the date of birth when it is entered into the system. Range check Presence check .« Length check io} www.RocketRevise.com www.RocketRevise.com (iii) Explain why the data in the system may not be correct even after validating and verifying the data [Turn over www.RocketRevise.com www.RocketRevise.com 2 Draw one line from each security feature to its most appropriate description. Security feature Description converts data to an alternative form firewall redirects a user to a fake website pharming - verifies the authenticity of data anti-virus software scans files on the hard drive for malicious software encryption 4 accepts or rejects incoming and outgoing packets based on criteria (4) www.RocketRevise.com www.RocketRevise.com 6 Data needs to be kept secure when stored on a computer and during transmission over a network. (a) Explain how a digital signature is used to authenticate a digital document during transmission over a network. i} (b) Complete the table by identifying and describing two types of software that can be installed on a computer to prevent threats over a network. Type of software Description (2 [Turn over. www.RocketRevise.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy